Chapter Three: Review on privacy-preserving data comparison protocols in cloud computing

Leqi Jianga,b; Zhihua Xiaa,b; Xingming Suna,b    a School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Chinab Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, China

Abstract

Data comparison is a crucial step in many operations, including data mining, data classification, image feature extraction, and image retrieval. With the existing data encryption technology, encrypted data computation and encrypted data comparison can be executed; however, there is no single data encryption method can meet the challenge of tackle the two tasks at the same time. ...

Get AI and Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.